Received: by 2002:a05:6358:c692:b0:131:369:b2a3 with SMTP id fe18csp1562948rwb; Wed, 26 Jul 2023 14:47:22 -0700 (PDT) X-Google-Smtp-Source: APBJJlElYjpZCdQ2MfW/jxtC1vpktaXsmCXowgaDmKXErPPKIOUXIpMK3go9w+oOvtkzvs1xjtPg X-Received: by 2002:a17:90a:f409:b0:263:5376:b952 with SMTP id ch9-20020a17090af40900b002635376b952mr804808pjb.9.1690408042490; Wed, 26 Jul 2023 14:47:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1690408042; cv=none; d=google.com; s=arc-20160816; b=M6O5LXG6EhNPELSJqEcp4QUjuIo1UHWqk1/PZmBVe33S1fgJsceS8VMmXK5lvsIHpl 34oecFqAPhOjjR4xMzuxaYyKOo10iEoSACAkeliSXDT2k1YvZXVuhdO7BpR7asCTWKp+ /ajBGiq5HJwFuMvTZykd54BO+CICjd/Yk1BEra/IDflsnlGNMEJD27f/bE8aBVBY6siZ 8ebN1/rL6bSjRVFuWGLYjPCnN9cqCPzJV78tC5rvpwBw55BtQlI2j2HjIJvzxq3LD4GQ bJyV7Vj6M9xZA0eFpPGHwAwxSYsYVs4K5PRzV6Y6x+nBrOKxkO8g2tAet1jdMkimuTRM h9ew== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=Z2kLlpLkEgZtP7izpTTUI1ROGL8wQ9hwKLInZOYxV6g=; fh=aSwUp+tlBOV7fvO2OGHdkRIZqsF/0qg0AZkBhydyk90=; b=V5Ozw11H/WRXVp6YKQHtcQ42zUdzoUlmbTiq4DvQPT83I2kvsXR0kTgO8+htkuGP+Y XVZYoWb2LxWNtP4V2PAc1+jiU+5jnt36btSSIN232bzOJB2rGvsecBqo9juqo0CLOaao yLX6MQrBbwwCvnSEjhlrbnyTsd8RPKAeLyUHhhg86te8wHLATyrhyNZp3wGINeR3YJd/ FHZ6TnbU7TjD7ILE3GUdit02SRafKrM7aTqModg9KSxqSch9jK8eI4EUpWy91nWyTkp9 fUi8YYlO4QVaWrlHCa9Y5ejNw4EezrFcBZ7RfHE606a8DjcUnl7QOvZcx5SWEBFOfbhc xP+Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@wanadoo.fr header.s=t20230301 header.b=G9LhEvgg; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id bg22-20020a17090b0d9600b00253160141c7si1640898pjb.83.2023.07.26.14.47.09; Wed, 26 Jul 2023 14:47:22 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@wanadoo.fr header.s=t20230301 header.b=G9LhEvgg; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230386AbjGZU6B (ORCPT + 99 others); Wed, 26 Jul 2023 16:58:01 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35992 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230197AbjGZU6A (ORCPT ); Wed, 26 Jul 2023 16:58:00 -0400 Received: from smtp.smtpout.orange.fr (smtp-24.smtpout.orange.fr [80.12.242.24]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6D9D31727 for ; Wed, 26 Jul 2023 13:57:59 -0700 (PDT) Received: from [192.168.1.18] ([86.243.2.178]) by smtp.orange.fr with ESMTPA id Ola0qS53LHI6nOla0q3IeG; Wed, 26 Jul 2023 22:57:58 +0200 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=wanadoo.fr; s=t20230301; t=1690405078; bh=Z2kLlpLkEgZtP7izpTTUI1ROGL8wQ9hwKLInZOYxV6g=; h=Date:Subject:To:Cc:References:From:In-Reply-To; b=G9LhEvggbzF6efKkV3h/E9ejYFTDdoBVLn75M1NELKiJ6FbpHxdn9vnV6TsqljgiD JV09lLrS2rh7O5w+nctS/aqZCTBHInbro3x14E+kj73YlB3RC01RUtNWsVgSlV4Mp5 XyzhlmQ2zUzVwQYmoVR3FkH3U5N+VavCtrj0H306SZAMmyvxHQUf211af7fqnrZw0f qnmKz6yKUkb+CwCb8rGkObbV6z5XbVYT7o12o08KgP7pfzSQiNBN0CU5gD1TzbaNDv 2n1RVf/xBs4Lp+VpyfAxie5NH65toq9ljYVIFjjDkCR6LI6mbOj4zFBaMFFmTuvIaI YD10S6csiRsKA== X-ME-Helo: [192.168.1.18] X-ME-Auth: Y2hyaXN0b3BoZS5qYWlsbGV0QHdhbmFkb28uZnI= X-ME-Date: Wed, 26 Jul 2023 22:57:58 +0200 X-ME-IP: 86.243.2.178 Message-ID: <5125e39b-0faf-63fc-0c51-982b2a567e21@wanadoo.fr> Date: Wed, 26 Jul 2023 22:57:56 +0200 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.13.0 Subject: Re: [PATCH] dmaengine: xgene: Fix potential deadlock on &chan->lock Content-Language: fr To: Chengfeng Ye , vkoul@kernel.org, rsahu@apm.com, lho@apm.com, allen.lkml@gmail.com, romain.perier@gmail.com, dan.j.williams@intel.com Cc: dmaengine@vger.kernel.org, linux-kernel@vger.kernel.org References: <20230726111630.25670-1-dg573847474@gmail.com> From: Christophe JAILLET In-Reply-To: <20230726111630.25670-1-dg573847474@gmail.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.2 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A, RCVD_IN_DNSWL_BLOCKED,RCVD_IN_MSPIKE_H5,RCVD_IN_MSPIKE_WL, SPF_HELO_PASS,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Le 26/07/2023 à 13:16, Chengfeng Ye a écrit : > As xgene_dma_cleanup_descriptors() is invoked by both tasklet > xgene_dma_tasklet_cb() under softirq context and > xgene_dma_free_chan_resources() callback that executed under process > context, the lock aquicision of &chan->lock inside > xgene_dma_cleanup_descriptors() should disable irq otherwise deadlock > could happen if the tasklet softirq preempts the execution of process > context code while the lock is held in process context on the same CPU. > > Possible deadlock scenario: > xgene_dma_free_chan_resources() > -> xgene_dma_cleanup_descriptors() > -> spin_lock(&chan->lock) > > -> xgene_dma_tasklet_cb() > -> xgene_dma_cleanup_descriptors() > -> spin_lock(&chan->lock) (deadlock here) > > This flaw was found by an experimental static analysis tool I am developing > for irq-related deadlock. Hi, first of all, for what I've seen from your numerous recent patches, all this look real great ! :) And your experimental tool looks really promising. Even if I'm not always confident with my understanding of locking and related subtilities, I wonder if in the cases of , like above, using spin_lock_bh() would be enough? It should be less agressive than spin_lock_irqsave() but still handle the use case you have spotted. Just my 2c. CJ > > The tentative patch fixes the potential deadlock by spin_lock_irqsave() in > plx_dma_process_desc() to disable irq while lock is held. > > Signed-off-by: Chengfeng Ye > --- > drivers/dma/xgene-dma.c | 5 +++-- > 1 file changed, 3 insertions(+), 2 deletions(-) > > diff --git a/drivers/dma/xgene-dma.c b/drivers/dma/xgene-dma.c > index 3589b4ef50b8..e766511badcf 100644 > --- a/drivers/dma/xgene-dma.c > +++ b/drivers/dma/xgene-dma.c > @@ -689,11 +689,12 @@ static void xgene_dma_cleanup_descriptors(struct xgene_dma_chan *chan) > struct xgene_dma_desc_sw *desc_sw, *_desc_sw; > struct xgene_dma_desc_hw *desc_hw; > struct list_head ld_completed; > + unsigned long flags; > u8 status; > > INIT_LIST_HEAD(&ld_completed); > > - spin_lock(&chan->lock); > + spin_lock_irqsave(&chan->lock, flags); > > /* Clean already completed and acked descriptors */ > xgene_dma_clean_completed_descriptor(chan); > @@ -762,7 +763,7 @@ static void xgene_dma_cleanup_descriptors(struct xgene_dma_chan *chan) > */ > xgene_chan_xfer_ld_pending(chan); > > - spin_unlock(&chan->lock); > + spin_unlock_irqrestore(&chan->lock, flags); > > /* Run the callback for each descriptor, in order */ > list_for_each_entry_safe(desc_sw, _desc_sw, &ld_completed, node) {